TypeClassroom Training
Time5 Days

CISSP Training – Certified Information System Security Professional Training Course & Certification


Audience & Prerequisites

Course Outline

Schedule & Fees


CISSP Training Course & Certification

In this course, you will identify and reinforce the major security subjects from the eight domains of the (ISC)2 CISSP CBK.

  • Analyze components of the Security and Risk Management domain.
  • Analyze components of the Asset Security domain.
  • Analyze components of the Security Engineering domain.
  • Analyze components of the Communications and Network Security domain.
  • Analyze components of the Identity and Access Management domain.
  • Analyze components of the Security Assessment and Testing domain.
  • Analyze components of the Security Operations domain.
  • Analyze components of the Software Development Security domain.

Intended Audience of CISSP Training

This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience.

Prerequisites for CISSP Certification Course

It is highly recommended that students have certifications in Network+ or Security+, or possess equivalent professional experience upon entering CISSP training. It will be beneficial if students have one or more of the following security-related or technology-related certifications or equivalent industry experience: CyberSec First Responder (CFR), MCSE, CCNP, RHCE, LCE, SSCP®, GIAC, CISA™, or CISM®.

Course Outline                                                  Duration: 5 Days

1  Information Security and Risk Management

  • Information Security Management
  • Security Awareness Training and Education
  • Risk Management
  • Ethics

2  Access Control

  • Definitions and Key Concepts
  • Information Classification
  • Access Control Categories and Types
  • Access Control Threats
  • Access to Systems/Data
  • Access Control Technologies
  • Assurance Mechanisms

3  Cryptography

  • Key Concepts and Definitions
  • History
  • Encryption Systems
  • Symmetric and Asymmetric Algorithms
  • Message Integrity Controls
  • Digital Signatures
  • Management of Cryptographic Systems
  • Threats and Attacks

4   Physical Security

  • Definitions and Key Concepts
  • Site Location
  • Layered Defense Model
  • Infrastructure Support Systems
  • Equipment Protection

5  Security Architecture and Design

  • Components and Principles
  • System Security Techniques
  • Hardware
  • Software
  • Security Models and Architecture Theory
  • Security Evaluation Methods and Criteria

6  Business Continuity Planning and Disaster Recovery Planning

  • Project Scope Development and Planning
  • Business Impact Analysis
  • Emergency Assessment
  • Continuity and Recovery Strategy
  • Plan Design and Development
  • Implementation
  • Restoration
  • Plan Management

7  Telecommunications and Network Security

  • Key Concepts and Definitions
  • Networks
  • Protocols
  • Remote Access
  • Network Components
  • Telephony

8  Application Security

  • System Lifecycle Security
  • Application Environment and Security Controls
  • Programming Languages and Tools
  • Databases and Data Warehouses
  • Applications Systems Threats and Vulnerabilities
  • Applications Security Controls

9  Operations Security

  • Resource Protection
  • Change Control Management
  • Physical Security Controls
  • Privileged Entity Control

10  Legal, Regulations, Compliance and Investigation

  • Major Legal Systems
  • Legal Concepts
  • Regulatory Issues
  • Investigation
  • Computer Forensics

Please write to us at info@itstechschool.com & contact us at +91-9870480053 for the course price & certification cost, schedule & location

Drop Us a Query

  • Number of Questions: 250 Questions
  • Duration: Up to 6 hours
  • Test Format: Multiple Choice
  • Passing Score: 70%
  • Testing Center: Pearson VUE Testing Center